Re: PHP Security

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



"Greg Donald" <destiney@xxxxxxxxx> wrote in message 
news:ea9da26c04120712282c5fc587@xxxxxxxxxxxxxxxxx
> The other day a post came across one of those mailing lists discussing
> PHP security.  One of the posters was describing how insecure PHP's
> file upload functionality is and went on to explain a simple method of
> attaching exploit code to the end of a jpeg or other image format,
> then proceeding in uploading the image to the target site that
> accepted image uploads.  The code would be executed as PHP in spite of
> the file type detection.

Chris already gave a good response to all this, but I am curious myself - 
can this mystery antagonist provide an example exploit?  What he is 
suggesting seems impossible, unless for some strange reason you have set 
Apache to execute .jpg files at PHP code.  In which case the security hole 
is the admin who set things up like that, not PHP!

Can you also provide a link to the relevant message in the mailing list 
archive?  I would like to read this myself.

  -Josh 

-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php


[Index of Archives]     [PHP Home]     [Apache Users]     [PHP on Windows]     [Kernel Newbies]     [PHP Install]     [PHP Classes]     [Pear]     [Postgresql]     [Postgresql PHP]     [PHP on Windows]     [PHP Database Programming]     [PHP SOAP]

  Powered by Linux